Tag: spy
-
Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle
A Chinese threat actor who targeted an Asian software company used the same toolset for the ransomware attack that was found in multiple cyberespionage incidents, leaving Symantec analysts to believe the hacker was a Chinese spy who used the malicious tools to earn some money on the side. First seen on securityboulevard.com Jump to article:…
-
Intelligence agencies must explain what they do, says UK’s former cyber spy chief
Speaking at the Munich Cyber Security Conference on Thursday, Sir Jeremy Fleming, who headed the cyber and signals intelligence agency GCHQ from 2017 to 2023, said he felt “really strongly” the agency’s “license to operate” had to be based on public understanding and trust. First seen on therecord.media Jump to article: therecord.media/intel-agencies-must-explain-what-they-do-fleming-gchq
-
DeepSeek Accused of Over-Collecting Personal Data, Says South Korea’s Spy Agency
South Korea’s National Intelligence Service (NIS) has raised alarms over the Chinese artificial intelligence app, DeepSeek, accusing it of >>excessively
-
Privacy Roundup: Week 6 of Year 2025
Tags: access, ai, api, apple, backdoor, breach, browser, cctv, chrome, control, credit-card, cybersecurity, data, data-breach, encryption, exploit, firmware, framework, germany, government, group, leak, malware, monitoring, phishing, privacy, regulation, risk, router, scam, service, software, spy, technology, threat, tool, update, vpn, vulnerability, windowsThis is a news item roundup of privacy or privacy-related news items for 2 FEB 2025 – 8 FEB 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access
United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all encrypted content stored in its iCloud service. The demand, issued under the U.K.’s controversial Investigatory Powers Act of 2016, has raised alarm among privacy advocates and tech experts. If implemented, this order would allow British authorities to bypass encryption protections not…
-
Spy vs spy: Security agencies help secure the network edge
Tags: cybersecurity, exploit, firewall, infrastructure, intelligence, Internet, network, router, service, software, spy, strategy, vpn, vulnerabilityThe national intelligence services of five countries have offered enterprises advice on beating spies at their own game in a series of documents intended to help them protect network edge devices and appliances such as firewalls, routers, VPN (virtual private networks) gateways, internet of things (IoT) devices, internet-facing servers, and internet-facing OT (operational technology) systems…
-
DEF CON 32 Hacker Vs. AI Perspectives From An Ex-Spy
Author/Presenter: Harriet Farlow Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-hacker-vs-ai-perspectives-from-an-ex-spy/
-
DeepSeek Blocked In US Federal Agencies
Security Concerns, Chinese Ownership Drive Concerns. U.S. federal agencies and corporations with ties to the government are blocking employees from using Chinese chatbot DeepSeek over security and privacy concerns. China could potentially use DeepSeek AI models to spy on American citizens, acquire proprietary secrets and conduct influence campaigns. First seen on govinfosecurity.com Jump to article:…
-
iPhone users targeted in Apple’s first zero-day exploit in 2025
Apple iPhone users were targeted for privilege escalation in the zero-day exploitation of a use-after-free vulnerability affecting Apple’s Core Media framework.”A malicious application may be able to elevate privileges,” Apple said in the security update description. “Apple is aware of a report that this issue may have been actively exploited against versions of iOS before…
-
Suspected Ukrainian hackers impersonating Russian ministries to spy on industry
Researchers have recently observed phishing emails purportedly from Russia’s Ministry of Industry and Trade laden with remote access malware.]]> First seen on therecord.media Jump to article: therecord.media/suspected-ukraine-hackers-russian-phishing
-
Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location
A hack of location data company Gravy Analytics has revealed which apps are”, knowingly or not”, being used to collect your information behind the scenes. First seen on wired.com Jump to article: www.wired.com/story/gravy-location-data-app-leak-rtb/
-
Finland finds Russian ‘spy’ ship anchor as subsea cable company demands ship’s seizure for compensation
Finnish authorities investigating a series of submarine cable breaks that took place on Christmas Day have located and retrieved an anchor suspected of being dragged along the Baltic Sea floor by the Eagle S, an alleged Russian spy ship.]]> First seen on therecord.media Jump to article: therecord.media/finland-russia-spy-ship-anchor
-
Collecting Spy Sheets: CSS erlaubt User-Tracking in E-Mails
Nicht nur im Web, sondern auch in E-Mails lassen sich User verfolgen. Das Tracking per CSS unterbinden nur wenige Mail-Clients. First seen on heise.de Jump to article: www.heise.de/news/Collecting-Spy-Sheets-CSS-erlaubt-User-Tracking-in-E-Mails-10226921.html
-
More telecom firms were breached by Chinese hackers than previously reported
Tags: access, at&t, attack, breach, china, cisco, communications, cyber, cyberespionage, cybersecurity, data, defense, disinformation, espionage, exploit, finance, fortinet, framework, government, group, hacker, Hardware, infrastructure, intelligence, international, microsoft, mobile, network, phone, regulation, risk, risk-management, router, spy, technology, threat, vulnerabilityChinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage…
-
Finland identifies seven suspects among crew of alleged Russian ‘spy’ tanker
Seven crew members of the seized ship Eagle S are being treated as suspects as Finland investigates undersea cable sabotage and alleged Russian spying.]]> First seen on therecord.media Jump to article: therecord.media/finland-suspects-identified-alleged-russian-spy-ship
-
Congress Again Fails to Limit Scope of Spy Powers in New Defense Bill
The National Defense Authorization Act passed today, but lawmakers stripped language that would keep the Trump administration from wielding unprecedented authority to surveil Americans. First seen on wired.com Jump to article: www.wired.com/story/congress-spy-powers-fisa-ndaa-trump-702/
-
New Android NoviSpy spyware linked to Qualcomm zero-day bugs
The Serbian government exploited Qualcomm zero-days to unlock and infect Android devices with a new spyware named ‘NoviSpy,’ used to spy on activists, journalists, and protestors. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/
-
Ukraine uncovers Russian spy network recruiting teens for espionage
The suspected spies were allegedly photographing Ukrainian air defense facilities when they were arrested.]]> First seen on therecord.media Jump to article: therecord.media/ukraine-sbu-espionage-campaign-russia
-
Russian cyberspies target Android users with new spyware
Russian cyberspies Gamaredon has been discovered using two Android spyware families named ‘BoneSpy’ and ‘PlainGnome’ to spy on and steal data from mobile devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russian-gamaredon-cyberspies-target-android-users-with-new-spyware/
-
Russia Used Borrowed Spyware to Target Ukrainian Troops
Secret Blizzard Used Third-party Amadey Bots to Hack Ukrainian Military Devices. A Russian state-backed hacker group used third-party data-stealing bots and possibly a backdoor used by another Russia-based threat group to infiltrate and spy on devices used by frontline Ukrainian military units, according to a report from the Microsoft threat intelligence team. First seen on…
-
Experts discovered surveillance tool EagleMsgSpy used by Chinese law enforcement
Chinese law enforcement uses the mobile surveillance tool EagleMsgSpy to gather data from Android devices, as detailed by Lookout. Researchers at the Lookout Threat Lab discovered a surveillance tool, dubbed EagleMsgSpy, used by Chinese law enforcement to spy on mobile devices. The researchers analyzed multiple samples of the malware and gained access to internal documents obtained from…
-
âš¡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even the smartest of us. On the other side, the good guys are busting secret online markets and kicking out shady chat rooms, while big companies…
-
As Trump vows to remold intel agencies, US spy chief defends current model
Tags: spyFirst seen on therecord.media Jump to article: therecord.media/avril-haines-defends-odni-as-trump-vows-to-remake-intel-agencies
-
Russian state hackers hijacked rival servers to spy on targets in India, Afghanistan
First seen on therecord.media Jump to article: therecord.media/russian-turla-secret-blizzard-hackers-hijack-rival-servers-targeting-south-asia
-
Spy v Spy: Russian APT Turla Caught Stealing from Pakistani APT
Russia’s Turla hackers hijacked 33 command servers operated by Pakistani hackers who had themselves breached Afghanistan and Indian targets. The post Spy v Spy: Russian APT Turla Caught Stealing from Pakistani APT appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/
-
Former Polish spy chief arrested to testify before parliament in spyware probe
First seen on therecord.media Jump to article: therecord.media/poland-former-spy-chief-testifies-pegasus-spyware
-
Poland arrests former spy chief in Pegasus spyware probe
The former head of Poland’s internal security agency Piotr Pogonowski was forced to appear in front of a parliamentary committee investigating the alleged abuse of Pegasus spyware in the country. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/02/poland-arrests-former-spy-chief-in-pegasus-spyware-probe/

